RED TEAM ENGAGEMENT — RULES OF ENGAGEMENT
Authorisation:
- Signed by: CISO + CEO
- Scope: [Company name] production environment
- Duration: 2024-02-01 to 2024-04-30
Authorised activities:
- Physical access: Building A only
- Network: 10.0.0.0/8 (corporate), *.corp.com
- Social engineering: phishing only (no vishing/impersonation)
- Credentials: discovered/obtained only (no pre-supplied creds)
PROHIBITED:
- Any systems processing real payment card data
- Production databases containing PHI
- DoS/DDoS attacks
- Data destruction or modification
- Third-party infrastructure
Emergency stop:
- Red team leader contacts: [CISO phone]
- All activity halts within 5 minutes
- Evidence preserved, systems restored
Evidence handling:
- All captured data: encrypted, deleted within 30 days post-report
- Chain of custody for any credentials found
Implant (on target)
↕ encrypted HTTPS/DNS/ICMP
Redirector (cloud VPS)
↕ authenticated channel
Team Server (red team infra)
↕
Operator console (Cobalt Strike, Sliver, Havoc)
1. Pre-exercise (1 week before):
- Select 5-10 ATT&CK techniques based on threat intel
- Confirm log sources available for each technique
- Define detection success criteria
2. Exercise day:
For each technique:
a. Red executes technique (documented)
b. Blue checks: did SIEM alert? (within 5 min)
c. Result: Detected / Detected-late / Missed
d. If missed: create detection rule on the spot
e. Re-execute to validate new detection
3. Post-exercise:
- Detection coverage improvement report
- ATT&CK Navigator heatmap update
- Detection rules committed to SIEM
- Recommendations for log source gaps
Executive Summary (1-2 pages):
- Engagement objectives and duration
- Critical findings (non-technical language)
- Business risk of each finding
- Top 5 recommendations
Attack Narrative:
- Day-by-day timeline of attack path
- Initial access method and success rate
- Lateral movement path (with host names)
- Objectives achieved: [list]
- Objectives NOT achieved: [list with why]
Technical Findings (by kill chain phase):
Recon:
- Finding: LinkedIn enumeration exposed 3 admin accounts
- Impact: Targeted phishing for credential theft
- Evidence: Screenshots, tool output
- Recommendation: LinkedIn visibility policy
Initial Access:
- Finding: Phishing success rate: 12/50 (24%)
- Finding: MFA bypass via SIM swap (2 accounts)
- Impact: Initial foothold achieved in 4 hours
[Continue for each phase...]
Detection Coverage Analysis:
- % of techniques detected by SOC
- Time to detection per technique
- False negatives by category
- ATT&CK heatmap: red (not detected) / green (detected)
Remediation Roadmap:
- Priority 1 (immediate, < 30 days): [list]
- Priority 2 (short-term, < 90 days): [list]
- Priority 3 (strategic, < 1 year): [list]